63% of organizations face security breaches due to hardware vulnerabilities

Tech Republic Security

While hardware-level attacks are high, only 59% of companies have implemented a hardware security strategy, Dell and Forrester found

Dell 122

New Evidence of Hacked Supermicro Hardware Found in U.S. Telecom

CTOvision

telecommunications company discovered manipulated hardware from Super Micro Computer Inc. according to a security expert working for the telecom company. The security expert, Yossi Appleboum, provided documents, analysis and other evidence […]. CTO Cyber Security NewsA major U.S. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S.,

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

We love ideas like this: Open-source hardware could defend against the next generation of hacking

CTOvision

Pearce argue that open-source hardware could be the ultimate key against cyber attacks that companies are trying hard to find on The Conversation : You must have heard about open-source software helping in fighting cyber attacks but imagine open-source hardware doing the same job for you in much better way. Cyber Security NewsRead Prof. Joshua M.

How Microsoft is using hardware to secure firmware

Tech Republic Security

Even full disk encryption can't keep you secure if your PC firmware is compromised, so Secured-core PCs will use the CPU to check if UEFI is telling the truth about secure boot

You have always known there is a threat of hardware attacks: Get ugly details here

CTOvision

It is important to remember the threat of hardware based attacks. Bloomberg Businessweek has just run a well researched story into a hardware attack that is incredible in scope. CTO Cyber Security Cyber War NewsThey have always been a threat vector, but hardly ever in the news. Now that part has changed. The overall theme of the attack will not […].

Intel to set up new group to focus on hardware security

Computer Weekly

Chip maker is reportedly planning to form a new group to focus on hardware security as it scrambles to limit the impact of recently discovered security flaws in chip designs

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets.

Supermicro is the latest hardware vendor with a security issue

Network World

Security researchers with Eclypsium, a firm created by two former Intel executives that specializes in rooting out vulnerabilities in server firmware, have uncovered vulnerabilities affecting the firmware of Supermicro servers. A physical attacker who can open the case could simply attach a hardware programmer to bypass protections.

HPE’s Gen10 Servers Will Have Security Drilled into Silicon

Data Center Knowledge

The company's custom silicon enables security at the firmware level. Design Hardware Hewlett Packard Enterprise SecurityRead More.

NSA’s Hardware Tampering May Alter Global Product Flow

Data Center Knowledge

when supplying hardware to customers overseas Read More. Cisco Dell Networking Regulation Security vendors may be looking at circumventing U.S.

Microsoft makes Windows 10 hardware change for PC security

Network World

Microsoft is rolling out a change in minimum hardware requirements for Windows 10 PCs and mobile devices, and expects hardware makers to comply in order to make their devices more secure. Starting Thursday, PC makers should include a hardware-based security feature called TPM (Trusted Platform Module) 2.0 security layer -- which can be in the form of a chip or firmware -- can safeguard user data by managing and storing cryptographic keys in a trusted container.

Intel divests McAfee after rough marriage, will now secure hardware

Network World

McAfee will now again become a standalone security company, but Intel will retain a minority 49 percent stake. The chip maker will focus internal operations on hardware-level security. Intel's finally washing its hands of McAfee after seven up and down years, which included a lawsuit last year from John McAfee, after whom the company is named. The chip maker has divested its majority holdings in McAfee to investment firm TPG for US$3.1 billion.

Boeing Black Smartphone: Security, modularity and productivity

CTOvision

Security, modularity and productivity delivered – all in one trusted mobile device. defense and security communities demand trusted access to data to accomplish their missions. Hardware Root of Trust : Ensures software authenticity. Secure Boot : Maintains device image integrity.

Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers

CTOvision

Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. CTO Cyber Security Infrastructure Companies News Security Companies SolarflareResearch Team.

A Flicker Of Light: A new security stack points the path to safety

CTOvision

Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Conceptually the new security stack is a hardware-based virtual enclave.

Gartner Top 7 Security and Risk Trends for 2019

CEB IT

Creating simple, practical and pragmatic risk appetite statements enabled this CISO to break down the cultural disconnect that existed between the security team and the different business units. This is one of seven security and risk management trends that Gartner expects to impact CISOs in 2019. 2: There is renewed interest in implementing or maturing security operations centers (SOCs) with a focus on threat detection and response. Security

Trends 236

The Endpoint Imperative: In a Software World, Hardware Does Matter

Cloud Musings

Hardware matters. From productivity to security to innovation, make sure your machines can keep up. Intel’s Sarah Wieskus joins The End Point Imperative: A Podcast series from Intel to discuss the importance of stable, optimized hardware in today’s digital world.

Amazon unveils new data center hardware to get you securely into the cloud

Tech Republic Data Center

At the 2016 re:Invent conference, AWS CEO Andy Jassy unveiled two new products, the Snowball Edge and Snowmobile, to make it even easier to get your data into the cloud

How to Keep Company IoT Networks Secure

CTOvision

Read Grayson Kemper explain how companies can keep the Internet of Things networks secure on IoT for All : As employees increase how often they use smart devices as part of their daily jobs, businesses are investing in building IoT networks. While IoT networks make information accessible and protected from hardware errors, businesses should invest in […].

Big Data Cyber Security Architect Eddie Garcia Discusses Best Practices at 27 Jan Breakfast in DC

CTOvision

Eddie Garcia is regarded as one of the nation''s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. By Bob Gourley.

Join World Renowned Big Data Cyber Security Architect Eddie Garcia at 27 Jan Breakfast

CTOvision

Eddie Garcia is regarded as one of the nation''s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. By Bob Gourley.

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Nature is now providing engineers with the missing link that can help with the most vexing challenge of our age: enabling both security and functionality in our interconnected IT systems. Adversaries, including cyber criminals, states seeking national security information, hackers seeking glory, and hacktivists pushing causes, have all come to realize the value of successful cyberattacks, and they show no sign of stopping. CTO Cyber Security NewsBob Gourley.

Understanding the Security Risks of New Cloud Software

CTOvision

Cloud computing provides businesses with quality solutions for their IT needs, as well as substantial cost savings over purchasing and maintaining their own hardware and software. However, some concerns about cloud security risks appeared early in the industry and are still relevant today.

IBM extends z15 mainframe family, intensifies Linux security

Network World

IBM continued to reshape the mainframe with an eye toward further integrating it within hybrid clouds and securing Linux -based workloads. On the hardware side, IBM rolled out two entry-level, 19” single-frame, air-cooled platforms, the z15 Model T02 and LinuxONE III Model LT2.

Linux 149

12 hardware and software vulnerabilities you should address now

Network World

It's not a stretch to say that most organizations have at least some old hardware and software still in use. Walker White, president of BDNA, a company that tracks and analyzes end-of-life (EOL) data for hardware, software and medical devices, says that the main problem with out-of-date software and legacy hardware is that once they pass their EOL cycle, the vendor no longer maintains or supports the products, resulting in security vulnerabilities and risk to organizations.

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Wireless security is not only a huge subject, but it’s also extremely important. It was patched quickly but this raised wireless security questions about WPA2. This is a great example of being proactive in security. Six Tips for Upgrading Your Wireless Security.

Self-checking chips could eliminate hardware security issues

Tech Republic Security

Researchers may have found a way to validate chips, so all concerned parties are satisfied the silicon is backdoor-free

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

The breakfast event focused on security for big data designs and featured the highly regarded security architect Eddie Garcia. Eddie Garcia is chief security architect at Cloudera , a leader in enterprise analytic data management. By Katie Kennedy.

UK company takes retro approach to security

Tech Republic Security

Garrison wants to move security away from software and into hardware

Cisco Beefs Up Network Automation, Shifting Further Away from Hardware Focus

Data Center Knowledge

Slew of new software-defined products and services aimed at networks and security Read More. Cisco Networking Security

Is your enterprise software committing security malpractice?

Network World

Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing. ExtraHop deliberately chose not to name names in its four examples of enterprise security tools that were sending out data without warning the customer or user.

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

Hadoop Security: Protecting Your Big Data Platform is packed with the protective strategies, tips and techniques you will want to build into your designs early in your data modernization efforts. Title: Hadoop Security. Security is typically the longest phase of any Hadoop project.

Why You Don’t Need a Hardware Refresh

ITGCT

Businesses are in a position where they need to be able to leverage the “latest and greatest” in terms of hardware and software to maintain a competitive advantage, but are also balking at the upfront investment normally required at the same time.

Android gets patches for critical flaws in media handling, hardware drivers

Network World

Android is getting security fixes for more than 100 vulnerabilities, including 29 critical flaws in the media processing server, hardware-specific drivers and other components. Android's monthly security bulletin, published Monday , was split into two "patch levels," which are represented as date strings on the "About" page of Android devices.

The Innerworkings of a Security Operations Center

CTOvision

Cyber security breaches are becoming common news. The role of security is becoming more and more important in the IT sector. To solve security issues and to provide a rapid solution and response to security related problems, most of the companies are setting up Security Operations Center (SOC). SOC can be simply defined as a centralized unit that deals with security on an organizational level. 24/7 security monitoring. Cyber Security

How Does Cloud Endpoint Security Works?

Galido

Information Technology Blog - - How Does Cloud Endpoint Security Works? Their security measures and procedures are weak and they are minimal and since that is the case, they will be more prone to these cyber-attacks than even the larger companies and businesses. securities and the U.S.

Attackers can use CPU hardware bug for data

IT Manager Daily

Threat: Two vulnerabilities have been found in CPU hardware that utilizes speculative execution. The post Attackers can use CPU hardware bug for data appeared first on IT Manager Daily. In this week's e-newsletter IT Security CPU vulnerabilitiesMultiple vulnerabilities found in CPUs could put you at risk. Damage risk: The vulnerabilities, named Variant 3a and Variant 4, would allow bad actors with local user access to control future speculative execution.

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

The fact that more key sensors in ICS systems are found to be vulnerable is evidence of the inherent weaknesses in these systems and the need to secure them. Via Net Security, more here. By Ryan Kamauff Here are the top news and stories of the day.

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

Last year, Enterprise IT was dramatically shaped by the influx of security breaches, data leaks and a new wave of hackers. This year, two of 2014’s biggest stories will intersect as security and Windows 10 prepare to re-shape the Enterprise. Security Spending. Security breaches impacted some of the most well-known corporations in 2014, which is one reason IT executives list security as the No. Cyber Security DoD and IC Trends By Deepak Kumar.

Where Business is Getting IoT Security Wrong

IT Toolbox

Securing IoT is tricky business. IoT exploits include firmware spoofing, compromising hardware, man-in-the-middle attacks, interface exploits, and cloud hosted application hacks, among others. Businesses are not always ready for the unique security challenge posed by the massive deployment of IoT devices. “Current IT security control frameworks

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. This is not good security practice. Standardizing secure configurations. Can you believe it’s already May?

For Government Cyber Security Leaders and Big Data Designers: 27 Jan Breakfast To Share Design Patterns

CTOvision

Eddie Garcia is regarded as one of the nation’s greatest Big Data security architects. At Gazzang he led engineering teams though successful fielding of secure hadoop deployments where security was provided without sacificing performance. Now a security engineer with Cloudera, Eddie continues to work directly with clients from enterprises from multiple sectors of the economy. Ways to leverage Intel hardware for enhanced security performance.

Android gets patches for serious flaws in hardware drivers and media server

Network World

The June batch of Android security patches addresses nearly two dozen vulnerabilities in system drivers for various hardware components from several chipset makers. The largest number of critical and high severity flaws were patched in the Qualcomm video driver, sound driver, GPU driver, Wi-Fi driver, and camera driver.